Go to file
2023-07-18 11:16:36 +03:00
2023-01-04 21:06:36 +05:30
2023-09-22 00:11:33 +09:00
2022-10-11 18:49:17 +02:00
2023-07-07 23:10:33 +02:00
2022-10-12 12:13:55 +02:00
2022-10-12 12:13:55 +02:00
2023-10-02 12:52:10 +02:00
2023-06-10 20:08:23 +02:00
2023-06-10 20:08:23 +02:00
2023-10-02 17:12:36 +02:00
2023-09-19 09:58:22 +02:00
2023-08-24 22:15:11 +02:00
2023-08-24 22:15:11 +02:00
2023-01-11 23:19:26 +01:00
2022-10-12 20:35:32 +02:00
2022-10-24 12:28:31 -05:00
2023-06-29 10:19:14 +00:00
2022-10-12 12:13:55 +02:00
2022-10-12 12:13:55 +02:00
2022-10-26 20:36:15 -05:00
2022-05-01 00:47:18 +09:00
2020-12-13 04:34:10 +11:00
2023-06-22 19:03:06 +02:00
2023-04-09 12:35:43 -04:00
2023-07-18 22:19:29 +02:00
2022-10-12 12:13:55 +02:00
2022-08-09 11:02:21 +02:00
2023-07-18 18:23:34 +02:00
2022-09-16 16:37:40 +02:00
2019-05-25 16:27:35 +02:00
2023-03-10 22:14:22 +01:00
2023-03-10 23:20:39 +01:00

Payloads All The Things

A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques !
I ❤️ pull requests :)

You can also contribute with a 🍻 IRL, or using the sponsor button

Sponsor Tweet

An alternative display version is available at PayloadsAllTheThingsWeb.

📖 Documentation

Every section contains the following files, you can use the _template_vuln folder to create a new chapter:

  • README.md - vulnerability description and how to exploit it, including several payloads
  • Intruder - a set of files to give to Burp Intruder
  • Images - pictures for the README.md
  • Files - some files referenced in the README.md

You might also like the Methodology and Resources folder :

You want more ? Check the Books and Youtube videos selections.

👨‍💻 Contributions

Be sure to read CONTRIBUTING.md

Thanks again for your contribution! ❤️

🧙‍♂️ Sponsors

This project is proudly sponsored by these companies.

Languages
Python 83.8%
Ruby 6.3%
ASP.NET 3.8%
XSLT 2.6%
Classic ASP 1.4%
Other 1.9%